In this guided exercise, you will apply what you have learned to create an asymmetric encryption key pair. You will then retrieve the public key for a second user to send them a message. Finally, you will assume the role of the second user and use your private key to decrypt the first user’s message. For the purposes of this exercise, the first user is named cybrary and the second user is named sally.